default search action
Jana Dittmann
Person information
- affiliation: Otto von Guericke University of Magdeburg, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Dennis Siegel, Christian Kraetzer, Stefan Seidlitz, Jana Dittmann:
Media Forensic Considerations of the Usage of Artificial Intelligence Using the Example of DeepFake Detection. J. Imaging 10(2): 46 (2024) - [c237]Jana Dittmann, Christian Kraetzer, Jost Alemann, Bernhard Birnbaum:
Forensic Trace Analysis for MP3 based Stego-Malware: Exemplary Study for Stego-Algorithm and Capacity Attribution to derive YARA Rules for Malware Identification. IH&MMSec 2024: 101-112 - [c236]Stefan Kiltz, Jana Dittmann, Fabian Loewe, Christian Heidecke, Max John, Jonas Mädel, Fabian Preißler:
Forensic Image Trace Map for Image-Stego-Malware Analysis: Validation of the Effectiveness with Structured Image Sets. IH&MMSec 2024: 125-130 - [c235]Meghana Rao Bangalore Narasimha Prasad, Andrey Makrushin, Matteo Ferrara, Christian Kraetzer, Jana Dittmann:
GAN-based Minutiae-driven Fingerprint Morphing. IH&MMSec 2024: 175-186 - [c234]Jana Dittmann, Christian Krätzer, Stefan Kiltz, Robert Altschaffel, Claus Vielhauer, Steffen Wendzel, Sandro Wefel, Holger Nitsch:
Attribution von verdeckten (Informations-)Kanälen im Bereich kritischer Infrastrukturen und Potentiale für Prävention und Reaktion (ATTRIBUT). Sicherheit 2024: 265-269 - [c233]Venkata Srinath Mannam, Andrey Makrushin, Jana Dittmann:
On Feasibility of Transferring Watermarks from Training Data to GAN-Generated Fingerprint Images. VISIGRAPP (4): VISAPP 2024: 435-445 - 2023
- [j30]Andrey Makrushin, Andreas Uhl, Jana Dittmann:
A Survey on Synthetic Biometrics: Fingerprint, Face, Iris and Vascular Patterns. IEEE Access 11: 33887-33899 (2023) - [j29]Andrey Makrushin, Jana Dittmann:
Synthetische Daten in der Biometrie. Datenschutz und Datensicherheit 47(1): 22-26 (2023) - [c232]Dominik Söllinger, Simon Kirchgasser, Andreas Uhl, Andrey Makushin, Jana Dittmann:
Protocol Based Similarity Evaluation of Publicly Available Synthetic and Real Fingerprint Datasets. IJCB 2023: 1-9 - [c231]Dennis Siegel, Stefan Seidlitz, Christian Krätzer, Jana Dittmann:
Pros and cons of comparing and combining hand-crafted and neural network based DeepFake detection based on eye blinking behavior. Media Watermarking, Security, and Forensics 2023: 1-6 - [c230]Christian Krätzer, Dennis Siegel, Stefan Seidlitz, Jana Dittmann:
Human-in-control and quality assurance aspects for a benchmarking framework for DeepFake detection models. Media Watermarking, Security, and Forensics 2023: 379-1 - [c229]Andrey Makrushin, Venkata Srinath Mannam, Jana Dittmann:
Data-Driven Fingerprint Reconstruction from Minutiae Based on Real and Synthetic Training Data. VISIGRAPP (4: VISAPP) 2023: 229-237 - 2022
- [j28]Kevin Lamshöft, Tom Neubert, Jonas Hielscher, Claus Vielhauer, Jana Dittmann:
Knock, knock, log: Threat analysis, detection & mitigation of covert channels in syslog using port scans as cover. Digit. Investig. 40(Supplement): 301335 (2022) - [j27]Christian Kraetzer, Dennis Siegel, Stefan Seidlitz, Jana Dittmann:
Process-Driven Modelling of Media Forensic Investigations-Considerations on the Example of DeepFake Detection. Sensors 22(9): 3137 (2022) - [c228]Salatiel Ezennaya-Gomez, Edgar Blumenthal, Marten Eckardt, Justus Krebs, Christopher Kuo, Julius Porbeck, Emirkan Toplu, Stefan Kiltz, Jana Dittmann:
Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective. ARES 2022: 135:1-135:12 - [c227]Kevin Lamshöft, Jana Dittmann:
Covert Channels in Network Time Security. IH&MMSec 2022: 69-79 - [c226]Stefan Kiltz, Robert Altschaffel, Jana Dittmann:
Hidden in Plain Sight - Persistent Alternative Mass Storage Data Streams as a Means for Data Hiding With the Help of UEFI NVRAM and Implications for IT Forensics. IH&MMSec 2022: 107-112 - [c225]Dennis Siegel, Christian Krätzer, Stefan Seidlitz, Jana Dittmann:
Forensic data model for artificial intelligence based media forensics - Illustrated on the example of DeepFake detection. Media Watermarking, Security, and Forensics 2022: 1-6 - [c224]Andrey Makrushin, Venkata Srinath Mannam, B. N. Meghana Rao, Jana Dittmann:
Data-driven Reconstruction of Fingerprints from Minutiae Maps. MMSP 2022: 1-6 - 2021
- [j26]Christian Kraetzer, Andrey Makrushin, Jana Dittmann, Mario Hildebrandt:
Potential advantages and limitations of using information fusion in media forensics - a discussion on the example of detecting face morphing attacks. EURASIP J. Inf. Secur. 2021(1): 9 (2021) - [j25]Dennis Siegel, Christian Kraetzer, Stefan Seidlitz, Jana Dittmann:
Media Forensics Considerations on DeepFake Detection with Hand-Crafted Features. J. Imaging 7(7): 108 (2021) - [c223]Salatiel Ezennaya-Gomez, Stefan Kiltz, Christian Kraetzer, Jana Dittmann:
A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis. ARES 2021: 61:1-61:8 - [c222]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. ARES 2021: 67:1-67:12 - [c221]Jonas Hielscher, Kevin Lamshöft, Christian Krätzer, Jana Dittmann:
A Systematic Analysis of Covert Channels in the Network Time Protocol. ARES 2021: 69:1-69:11 - [c220]Salatiel Ezennaya-Gomez, Claus Vielhauer, Jana Dittmann:
A Semantic Model for Embracing Privacy as Contextual Integrity in the Internet of Things (Short Paper). CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 413-423 - [c219]Robert Altschaffel, Ivo Hempel, Oliver Keil, Josef Schindler, Martin Szemkus, Jana Dittmann, Matthias Lange, Karl Waedt, Yongjian Ding:
Supporting Security in Industrial Automation and Control Systems using Domain-Specific Modelling. GI-Jahrestagung 2021: 1759-1769 - [c218]Robert Altschaffel, Jonas Hielscher, Stefan Kiltz, Jana Dittmann:
Meta and Media Data Stream Forensics in the Encrypted Domain of Video Conferences. IH&MMSec 2021: 23-33 - [c217]Andrey Makrushin, Christof Kauba, Simon Kirchgasser, Stefan Seidlitz, Christian Kraetzer, Andreas Uhl, Jana Dittmann:
General Requirements on Synthetic Fingerprint Images for Biometric Authentication and Forensic Investigations. IH&MMSec 2021: 93-104 - [c216]Kevin Lamshöft, Tom Neubert, Christian Krätzer, Claus Vielhauer, Jana Dittmann:
Information Hiding in Cyber Physical Systems: Challenges for Embedding, Retrieval and Detection using Sensor Data of the SWAT Dataset. IH&MMSec 2021: 113-124 - [c215]Mario Hildebrandt, Aamir Shakir, Alexander Ziemke, Mohamed Abdelrazek, Hannes Stuetzer, Dominik Blut, Kevin Lamshöft, Salatiel Ezennaya-Gomez, Christian Kraetzer, Jana Dittmann:
AiroIdent - User identification based on analyzing WPA2 encrypted traffic containing search engine interactions. Media Watermarking, Security, and Forensics 2021 - [c214]Andrey Makrushin, Mark Trebeljahr, Stefan Seidlitz, Jana Dittmann:
On feasibility of GAN-based fingerprint morphing. MMSP 2021: 1-6 - [c213]Stefan Seidlitz, Kris Jürgens, Andrey Makrushin, Christian Kraetzer, Jana Dittmann:
Generation of Privacy-friendly Datasets of Latent Fingerprint Images using Generative Adversarial Networks. VISIGRAPP (4: VISAPP) 2021: 345-352 - [i2]Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert:
A Revised Taxonomy of Steganography Embedding Patterns. CoRR abs/2106.08654 (2021) - 2020
- [j24]Nicholas Whiskerd, Nicklas Körtge, Kris Jürgens, Kevin Lamshöft, Salatiel Ezennaya-Gomez, Claus Vielhauer, Jana Dittmann, Mario Hildebrandt:
Keystroke biometrics in the encrypted domain: a first study on search suggestion functions of web search engines. EURASIP J. Inf. Secur. 2020: 2 (2020) - [c212]Andrey Makrushin, Dennis Siegel, Jana Dittmann:
Simulation of Border Control in an Ongoing Web-based Experiment for Estimating Morphing Detection Performance of Humans. IH&MMSec 2020: 91-96 - [c211]Mario Hildebrandt, Kevin Lamshöft, Jana Dittmann, Tom Neubert, Claus Vielhauer:
Information Hiding in Industrial Control Systems: An OPC UA based Supply Chain Attack and its Detection. IH&MMSec 2020: 115-120
2010 – 2019
- 2019
- [c210]Andrey Makrushin, Christian Kraetzer, Jana Dittmann, Clemens Seibold, Anna Hilsmann, Peter Eisert:
Dempster-Shafer Theory for Fusing Face Morphing Detectors. EUSIPCO 2019: 1-5 - [c209]Tom Neubert, Christian Kraetzer, Jana Dittmann:
A Face Morphing Detection Concept with a Frequency and a Spatial Domain Feature Space for Images on eMRTD. IH&MMSec 2019: 95-100 - [c208]Robert Altschaffel, Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
Digital Forensics in Industrial Control Systems. SAFECOMP 2019: 128-136 - [c207]Andrey Makrushin, Tom Neubert, Jana Dittmann:
Humans Vs. Algorithms: Assessment of Security Risks Posed by Facial Morphing to Identity Verification at Border Control. VISIGRAPP (4: VISAPP) 2019: 513-520 - [c206]Clemens Seibold, Anna Hilsmann, Andrey Makrushin, Christian Kraetzer, Tom Neubert, Jana Dittmann, Peter Eisert:
Visual Feature Space Analyses of Face Morphing Detectors. WIFS 2019: 1-6 - 2018
- [j23]Tom Neubert, Andrey Makrushin, Mario Hildebrandt, Christian Kraetzer, Jana Dittmann:
Extended StirTrace benchmarking of biometric and forensic qualities of morphed face images. IET Biom. 7(4): 325-332 (2018) - [c205]Christian Kraetzer, Jana Dittmann:
Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels? ARES 2018: 11:1-11:8 - [c204]Nicholas Whiskerd, Jana Dittmann, Claus Vielhauer:
A Requirement Analysis for Privacy Preserving Biometrics in View of Universal Human Rights and Data Protection Regulation. EUSIPCO 2018: 548-552 - [c203]Tom Neubert, Christian Kraetzer, Jana Dittmann:
Reducing the False Alarm Rate for Face Morph Detection by a Morph Pipeline Footprint Detector. EUSIPCO 2018: 1002-1006 - [c202]Andrey Makrushin, Christian Kraetzer, Tom Neubert, Jana Dittmann:
Generalized Benford's Law for Blind Detection of Morphed Face Images. IH&MMSec 2018: 49-54 - 2017
- [j22]Ronny Merkel, Jana Dittmann, Claus Vielhauer:
A First Public Research Collection of High-Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age Estimation. IEEE Trans. Inf. Forensics Secur. 12(10): 2276-2291 (2017) - [c201]Kevin Lamshöft, Robert Altschaffel, Jana Dittmann:
Adapting Organic Computing Architectures to an Automotive Environment to Increase Safety & Security. Automotive - Safety & Security 2017: 103-119 - [c200]Robert Fischer, Kevin Lamshoft, Jana Dittmann, Claus Vielhauer:
Advanced issues in wireless communication security: Towards a security-demonstrator for smart-home environments. ICCST 2017: 1-6 - [c199]Christian Kraetzer, Andrey Makrushin, Tom Neubert, Mario Hildebrandt, Jana Dittmann:
Modeling Attacks on Photo-ID Documents and Applying Media Forensics for the Detection of Facial Morphing. IH&MMSec 2017: 21-32 - [c198]Mario Hildebrandt, Tom Neubert, Andrey Makrushin, Jana Dittmann:
Benchmarking face morphing forgery detection: Application of stirtrace for impact simulation of different processing steps. IWBF 2017: 1-6 - [c197]Andrey Makrushin, Tom Neubert, Jana Dittmann:
Automatic Generation and Detection of Visually Faultless Facial Morphs. VISIGRAPP (6: VISAPP) 2017: 39-50 - [p4]Mario Hildebrandt, Jana Dittmann, Claus Vielhauer:
Capture and Analysis of Latent Marks. Handbook of Biometrics for Forensic Science 2017: 19-35 - [e21]Christian Kraetzer, Yun-Qing Shi, Jana Dittmann, Hyoung Joong Kim:
Digital Forensics and Watermarking - 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10431, Springer 2017, ISBN 978-3-319-64184-3 [contents] - 2016
- [c196]Ronny Merkel, Jana Dittmann, Claus Vielhauer:
Resource-efficient latent fingerprint age estimation for Adhoc crime scene forensics: Quality assessment of flat bed scans and statistical features. IPTA 2016: 1-6 - [c195]Mario Hildebrandt, Jana Dittmann:
StirTraceV2.0 and printed fingerprint detection: simulation of acquisition condition tilting and its impact to latent fingerprint detection feature spaces for crime scene forgeries. IWBF 2016: 1-6 - [c194]Robert Clausing, Robert Fischer, Jana Dittmann, Yongjian Ding:
Your Industrial Facility and Its IP Address: A First Approach for Cyber-Physical Attack Modeling. SAFECOMP 2016: 201-212 - [c193]Ronny Merkel, Christian Kraetzer, Mario Hildebrandt, Stefan Kiltz, Sven Kuhlmann, Jana Dittmann:
A semantic framework for a better understanding, investigation and prevention of organized financial crime. Sicherheit 2016: 55-66 - [c192]Tom Neubert, Mario Hildebrandt, Jana Dittmann:
Image pre-processing detection: Evaluation of Benford's law, spatial and frequency domain feature performance. SPLINE 2016: 1-5 - 2015
- [j21]Mario Hildebrandt, Jana Dittmann:
StirTraceV2.0: Enhanced Benchmarking and Tuning of Printed Fingerprint Detection. IEEE Trans. Inf. Forensics Secur. 10(4): 833-848 (2015) - [c191]Jana Dittmann, Veit Köppen, Gunter Saake, Claus Vielhauer:
Second workshop on databases in biometrics, forensics and security applications (DBforBFS). BTW Workshops 2015: 19-20 - [c190]Christian Kraetzer, Jana Dittmann:
Considerations on the benchmarking of media forensics. EUSIPCO 2015: 61-65 - [c189]Claus Vielhauer, Jana Dittmann:
From biometric to forensic hashing: Challenges in digital crime scene trace analysis. EUSIPCO 2015: 764-768 - [c188]Ronny Merkel, Claus Vielhauer, Jana Dittmann, Robert Fischer, Mario Hildebrandt, Christian Arndt:
From classical forensics to digitized crime scene analysis. ICME 2015: 1-6 - [c187]Christian Arndt, Stefan Kiltz, Jana Dittmann, Robert Fischer:
ForeMan, a Versatile and Extensible Database System for Digitized Forensics Based on Benchmarking Properties. IH&MMSec 2015: 91-96 - [c186]Stefan Kiltz, Jana Dittmann, Claus Vielhauer:
Supporting Forensic Design - A Course Profile to Teach Forensics. IMF 2015: 85-95 - [c185]Ronny Merkel, Mario Hildebrandt, Jana Dittmann:
Application of stirtrace benchmarking for the evaluation of latent fingerprint age estimation robustness. IWBF 2015: 1-6 - [c184]Mario Hildebrandt, Jana Dittmann:
Benford's Law based detection of latent fingerprint forgeries on the example of artificial sweat printed fingerprints captured by confocal laser scanning microscopes. Media Watermarking, Security, and Forensics 2015: 94090A - [c183]Mario Hildebrandt, Jana Dittmann:
Benchmarking contactless acquisition sensor reproducibility for latent fingerprint trace evidence. Media Watermarking, Security, and Forensics 2015: 94090E - [c182]Robert Altschaffel, Tobias Hoppe, Sven Kuhlmann, Jana Dittmann:
Simulation of Automotive Security Threat Warnings to Analyze Driver Interpretations and Emotional Transitions. SAFECOMP 2015: 47-58 - [c181]Christian Arndt, Jana Dittmann, Claus Vielhauer:
Spectral Fiber Feature Space Evaluation for Crime Scene Forensics - Traditional Feature Classification vs. BioHash Optimization. VISAPP (1) 2015: 293-302 - [e20]Jana Dittmann, Holger Morgenstern:
Ninth International Conference on IT Security Incident Management & IT Forensics, IMF 2015, Magdeburg, Germany, May 18-20, 2015. IEEE Computer Society 2015, ISBN 978-1-4799-9902-6 [contents] - 2014
- [j20]Kun Qian, Maik Schott, Wenju Zheng, Jana Dittmann:
Context-based approach of separating contactless captured high-resolution overlapped latent fingerprints. IET Biom. 3(2): 101-112 (2014) - [c180]Jana Fruth, Matthias Thimm, Sven Kuhlmann, Jana Dittmann:
Ein erster Prototyp: Sicherheitsguide für Grundschulkinder beim Umgang mit dem Internet. GI-Jahrestagung 2014: 2081-2092 - [c179]Robert Altschaffel, Tobias Hoppe, Sven Kuhlmann, Jana Dittmann:
Beyond mileage: Towards more secure techniques to assess the fitness levels of smart cars. ICCVE 2014: 149-154 - [c178]Ronny Merkel, Jana Dittmann, Mario Hildebrandt:
Latent fingerprint persistence: A new temporal feature space for forensic trace evidence analysis. ICIP 2014: 4952-4956 - [c177]Mario Hildebrandt, Jana Dittmann:
From StirNark to StirTrace: benchmarking pattern recognition based printed fingerprint detection. IH&MMSec 2014: 71-76 - [c176]Robert Altschaffel, Jana Dittmann, Christian Krätzer, Stefan Kiltz:
A Hierarchical Model for the Description of Internet-Based Communication. IMF 2014: 85-94 - [c175]Jana Dittmann, Mario Hildebrandt:
Context analysis of artificial sweat printed fingerprint forgeries: Assessment of properties for forgery detection. IWBF 2014: 1-6 - [c174]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann, Claus Vielhauer:
An enhanced feature set for pattern recognition based contrast enhancement of contact-less captured latent fingerprints in digitized crime scene forensics. Media Watermarking, Security, and Forensics 2014: 902808 - 2013
- [c173]Jana Dittmann, Arno Fischer, Gunter Saake, Claus Vielhauer:
Workshop on Databases in Biometrics, Forensics and Security Applications. BTW Workshops 2013: 63 - [c172]Matthias Pocs, Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
Proposal of a privacy-enhancing fingerprint capture for a decentralized police database system from a legal perspective using the example of Germany and the EU. BTW Workshops 2013: 75-88 - [c171]Jana Fruth, Carsten Schulze, Marleen Rohde, Jana Dittmann:
E-Learning of IT Security Threats: A Game Prototype for Children. Communications and Multimedia Security 2013: 162-172 - [c170]Mario Hildebrandt, Andrey Makrushin, Kun Qian, Jana Dittmann:
Visibility Assessment of Latent Fingerprints on Challenging Substrates in Spectroscopic Scans. Communications and Multimedia Security 2013: 200-203 - [c169]Mario Hildebrandt, Jennifer Sturm, Jana Dittmann, Claus Vielhauer:
Creation of a Public Corpus of Contact-Less Acquired Latent Fingerprints without Privacy Implications. Communications and Multimedia Security 2013: 204-206 - [c168]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes. Multimedia Content and Mobile Devices 2013: 86670S - [c167]Jana Fruth, Marcel Beskau, Matthias Volk, Anneke Meyer, Robin Richter, Jana Dittmann:
Erster Konzeptansatz von Sicherheitstypen: Sicherheitsbewusstsein von Kindern und Jugendlichen im Umgang mit dem Internet. GI-Jahrestagung 2013: 2000-2014 - [c166]Mario Hildebrandt, Jana Dittmann, Claus Vielhauer:
Statistical latent fingerprint residue recognition in contact-less scans to support fingerprint segmentation. DSP 2013: 1-6 - [c165]Ronny Merkel, Karen Otte, Robert Clausing, Jana Dittmann, Claus Vielhauer, Anja Bräutigam:
First investigation of latent fingerprints long-term aging using chromatic white light sensors. IH&MMSec 2013: 95-104 - [c164]Robert Altschaffel, Robert Clausing, Christian Kraetzer, Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Statistical Pattern Recognition Based Content Analysis on Encrypted Network: Traffic for the TeamViewer Application. IMF 2013: 113-121 - [c163]Mario Hildebrandt, Jennifer Sturm, Jana Dittmann:
Printing artificial sweat using ink jet printers for the test set generation in forensics: an image quality assessment of the reproducibility of the printing results. IQSP 2013: 86530O - [c162]Kun Qian, Maik Schott, Jana Dittmann:
Separation of contactless captured high-resolution overlapped latent fingerprints: Parameter optimisation and evaluation. IWBF 2013: 1-4 - [c161]Jennifer Sturm, Mario Hildebrandt, Jana Dittmann, Claus Vielhauer:
High quality training materials to detect printed fingerprints: Benchmarking three different aquisition sensors producing printing templates. IWBF 2013: 1-4 - [c160]Robert Fischer, Claus Vielhauer, Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
Ballistic examinations based on 3D data: a comparative study of probabilistic Hough Transform and geometrical shape determination for circle-detection on cartridge bottoms. Media Watermarking, Security, and Forensics 2013: 86650F - [c159]Andrey Makrushin, Tobias Kiertscher, Mario Hildebrandt, Jana Dittmann, Claus Vielhauer:
Visibility enhancement and validation of segmented latent fingerprints in crime scene forensics. Media Watermarking, Security, and Forensics 2013: 866508 - [c158]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
Printed fingerprints at crime scenes: a faster detection of malicious traces using scans of confocal microscopes. Media Watermarking, Security, and Forensics 2013: 866509 - [p3]Claus Vielhauer, Jana Dittmann, Stefan Katzenbeisser:
Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain. Security and Privacy in Biometrics 2013: 25-43 - [e19]Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer:
Communications and Multimedia Security - 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings. Lecture Notes in Computer Science 8099, Springer 2013, ISBN 978-3-642-40778-9 [contents] - [e18]William Puech, Marc Chaumont, Jana Dittmann, Patrizio Campisi:
ACM Information Hiding and Multimedia Security Workshop, IH&MMSec '13, Montpellier, France, June 17-19, 2013. ACM 2013, ISBN 978-1-4503-2081-8 [contents] - 2012
- [j19]Christian Kraetzer, Jana Dittmann:
Plausibility Considerations on Steganalysis as a Security Mechanism - Discussions on the Example of Audio Steganalysis. Trans. Data Hiding Multim. Secur. 8: 80-101 (2012) - [c157]Ronny Merkel, Stefan Gruhn, Jana Dittmann, Claus Vielhauer, Anja Bräutigam:
General fusion approaches for the age determination of latent fingerprint traces: results for 2D and 3D binary pixel feature fusion. Three-Dimensional Image Processing (3DIP) and Applications 2012: 82900Y - [c156]Andrey Makrushin, Mario Hildebrandt, Jana Dittmann, Eric Clausing, Robert Fischer, Claus Vielhauer:
3D imaging for ballistics analysis using chromatic white light sensor. Three-Dimensional Image Processing (3DIP) and Applications 2012: 829016 - [c155]Mario Hildebrandt, Christian Arndt, Andrey Makrushin, Jana Dittmann:
Computer-aided fiber analysis for crime scene forensics. Computational Imaging 2012: 829608 - [c154]Karl Kümmel, Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Feature Selection on Handwriting Biometrics: Security Aspects of Artificial Forgeries. Communications and Multimedia Security 2012: 16-25 - [c153]Andrey Makrushin, Tobias Kiertscher, Robert Fischer, Stefan Gruhn, Claus Vielhauer, Jana Dittmann:
Computer-Aided Contact-Less Localization of Latent Fingerprints in Low-Resolution CWL Scans. Communications and Multimedia Security 2012: 89-98 - [c152]Fred Samland, Jana Fruth, Mario Hildebrandt, Tobias Hoppe, Jana Dittmann:
AR.Drone: security threat analysis and exemplary attack to track persons. Intelligent Robots and Computer Vision: Algorithms and Techniques 2012: 83010G - [c151]Wiebke Menzel, Sven Tuchscheerer, Jana Fruth, Christian Kraetzer, Jana Dittmann:
Design and evaluation of security multimedia warnings for children's smartphones. Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems 2012: 83040B - [c150]Ronny Merkel, Matthias Pocs, Jana Dittmann, Claus Vielhauer:
Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of Germany. DPM/SETOP 2012: 61-74 - [c149]Stefan Kiltz, Mario Hildebrandt, Jana Dittmann, Claus Vielhauer:
Challenges in contact-less latent fingerprint processing in crime scenes: Review of sensors and image processing investigations. EUSIPCO 2012: 1504-1508 - [c148]Sven Kuhlmann, Tobias Hoppe, Jana Dittmann:
Voruntersuchungen und erste Ergebnisse zur Webseitengestaltung für die situationsbewusste Unterstützung von Kindern in IT-Sicherheitsfragen. GI-Jahrestagung 2012: 573-584 - [c147]Enrico Herrmann, Andrey Makrushin, Jana Dittmann, Claus Vielhauer:
Driver/passenger discrimination for the interaction with the dual-view touch screen integrated to the automobile centre console. Image Processing: Algorithms and Systems / Parallel Processing for Imaging Applications 2012: 82950W - [c146]Mario Hildebrandt, Stefan Kiltz, Jennifer Sturm, Jana Dittmann, Claus Vielhauer:
High-resolution printed amino acid traces: a first-feature extraction approach for fingerprint forgery detection. Media Watermarking, Security, and Forensics 2012: 83030J - [c145]Christian Kraetzer, Kun Qian, Jana Dittmann:
Extending a context model for microphone forensics. Media Watermarking, Security, and Forensics 2012: 83030S - [c144]Eric Clausing, Christian Kraetzer, Jana Dittmann, Claus Vielhauer:
A first approach for the contactless acquisition and automated detection of toolmarks on pins of locking cylinders using 3D confocal microscopy. MM&Sec 2012: 47-56 - [c143]Rainer Kärgel, Mario Hildebrandt, Jana Dittmann:
An evaluation of biometric fingerprint matchers in a forensic context using latent impressions. MM&Sec 2012: 133-138 - [c142]Tobias Hoppe, Sven Kuhlmann, Stefan Kiltz, Jana Dittmann:
IT-Forensic Automotive Investigations on the Example of Route Reconstruction on Automotive System and Communication Data. SAFECOMP 2012: 125-136 - [c141]Sven Kuhlmann, Jana Fruth, Tobias Hoppe, Jana Dittmann:
Simulation of Structural Effects in Embedded Systems and Visualization of Dependencies According to an Intended Attack or Manipulation. SAFECOMP Workshops 2012: 498-507 - [c140]Janet Siegmund, Norbert Siegmund, Jana Fruth, Sven Kuhlmann, Jana Dittmann, Gunter Saake:
Program Comprehension in Preprocessor-Based Software. SAFECOMP Workshops 2012: 517-528 - [c139]Wiebke Menzel, Sven Tuchscheerer, Jana Fruth, Christian Krätzer, Jana Dittmann:
Designansatz und Evaluation von Kindgerechten Securitywarnungen für Smartphones. Sicherheit 2012: 211-221 - [c138]Ronny Merkel, Jana Dittmann, Claus Vielhauer:
Novel fingerprint aging features using binary pixel sub-tendencies: A comparison of contactless CLSM and CWL sensors. WIFS 2012: 7-12 - [c137]Maik Schott, Ronny Merkel, Jana Dittmann:
Sequence detection of overlapping latent fingerprints using a short-term aging feature. WIFS 2012: 85-90 - [e17]Chang-Tsun Li, Jana Dittmann, Stefan Katzenbeisser, Scott Craver:
Multimedia and Security Workshop, MM&Sec 2012, Coventry, United Kingdom, September 6-7, 2012. ACM 2012, ISBN 978-1-4503-1417-6 [contents] - 2011
- [j18]Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures. Reliab. Eng. Syst. Saf. 96(1): 11-25 (2011) - [c136]Marcus Leich, Stefan Kiltz, Christian Krätzer, Jana Dittmann, Claus Vielhauer:
Preliminary study of statistical pattern recognition-based coin counterfeit detection by means of high resolution 3D scanners. Three-Dimensional Imaging, Interaction, and Measurement 2011: 786412 - [c135]Sven Tuchscheerer, Christian Krätzer, Jana Dittmann, Tobias Hoppe:
Statistical effects of selected noise characteristics on speaker recognition in automotive environments: a first ANOVA-based investigation. AutomotiveUI 2011: 63-70 - [c134]Mario Hildebrandt, Jana Dittmann, Matthias Pocs, Michael Ulrich, Ronny Merkel, Thomas Fries:
Privacy Preserving Challenges: New Design Aspects for Latent Fingerprint Detection Systems with Contact-Less Sensors for Future Preventive Applications in Airport Luggage Handling. BIOID 2011: 286-298 - [c133]Martin Schäler, Sandro Schulze, Ronny Merkel, Gunter Saake, Jana Dittmann:
Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks. BNCOD 2011: 3-17 - [c132]Ronny Merkel, Jana Dittmann, Claus Vielhauer:
Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature. Communications and Multimedia Security 2011: 59-71 - [c131]Jana Fruth, Ronny Merkel, Jana Dittmann:
Security Warnings for Children's Smart Phones: A First Design Approach. Communications and Multimedia Security 2011: 241-243 - [c130]Jana Fruth, Christian Kraetzer, Jana Dittmann:
Design and evaluation of multimedia security warnings for the interaction between humans and industrial robots. Intelligent Robots and Computer Vision: Algorithms and Techniques 2011: 78780K - [c129]Sven Tuchscheerer, Tobias Hoppe, Christian Krätzer, Jana Dittmann:
FirstAidAssistanceSystem (FAAS): improvement of first aid measures using Car2Car-communication technology. Intelligent Robots and Computer Vision: Algorithms and Techniques 2011: 78780D - [c128]Stefan Kiltz, Marcus Leich, Jana Dittmann, Claus Vielhauer, Michael Ulrich:
Revised benchmarking of contact-less fingerprint scanners for forensic fingerprint detection: challenges and results for chromatic white light scanners (CWL). Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems 2011: 78810G - [c127]Tobias Scheidat, Juliane Heinze, Claus Vielhauer, Jana Dittmann, Christian Kraetzer:
Comparative review of studies on aging effects in context of biometric authentication. Multimedia on Mobile Devices / Multimedia Content Access: Algorithms and Systems 2011: 788110 - [c126]Kun Qian, Maik Schott, Christian Kraetzer, Matthias L. Hemmje, Holger Brocks, Jana Dittmann:
A Security Contextualisation Framework for Digital Long-Term Preservation. SDA 2011: 131-142 - [c125]Mario Hildebrandt, Ronny Merkel, Marcus Leich, Stefan Kiltz, Jana Dittmann, Claus Vielhauer:
Benchmarking contact-less surface measurement devices for fingerprint acquisition in forensic investigations: Results for a differential scan approach with a chromatic white light sensor. DSP 2011: 1-6 - [c124]Ronny Merkel, Christian Kraetzer, Jana Dittmann, Claus Vielhauer:
Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints - a capacity study for forensic approaches. DSP 2011: 1-6 - [c123]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann:
A Common Scheme for Evaluation of Forensic Software. IMF 2011: 92-106 - [c122]Ronny Merkel, Jana Dittmann:
Resolution and size of measured area influences on the short- and long-term aging of latent fingerprint traces using the binary pixel feature and a high-resolution non-invasive chromatic white light (CWL) sensor. ISPA 2011: 644-649 - [c121]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann, Ronny Merkel:
Detection of malicious traces in crime scene forensics: An enhanced optical dot pattern analysis for untreated traces of printed amino acid residues. ISPA 2011: 672-677 - [c120]Andrey Makrushin, Jana Dittmann, Claus Vielhauer, Marcus Leich:
User discrimination in automotive systems. Image Processing: Algorithms and Systems 2011: 78700J - [c119]Stefan Kiltz, Mario Hildebrandt, Jana Dittmann, Claus Vielhauer, Christian Kraetzer:
Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics. IQSP 2011: 78670U - [c118]Ronny Merkel, Christian Kraetzer, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann:
Fingerprint Forensics Application Protocol: Semi-automated Modeling and Verification of Watermark-Based Communication Using CASPER and FDR. IWDW 2011: 321-335 - [c117]Christian Kraetzer, Kun Qian, Maik Schott, Jana Dittmann:
A context model for microphone forensics and its application in evaluations. Media Forensics and Security 2011: 78800P - [c116]Marcus Leich, Stefan Kiltz, Jana Dittmann, Claus Vielhauer:
Non-destructive forensic latent fingerprint acquisition with chromatic white light sensors. Media Forensics and Security 2011: 78800S - [c115]Mario Hildebrandt, Stefan Kiltz, Jana Dittmann, Claus Vielhauer:
Malicious fingerprint traces: a proposal for an automated analysis of printed amino acid dots using houghcircles. MM&Sec 2011: 33-40 - [c114]Ronny Merkel, Anja Bräutigam, Christian Kraetzer, Jana Dittmann, Claus Vielhauer:
Evaluation of binary pixel aging curves of latent fingerprint traces for different surfaces using a chromatic white light (CWL) sensor. MM&Sec 2011: 41-50 - [c113]Christian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Jana Dittmann:
Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario. MM&Sec 2011: 93-102 - [c112]Ronny Merkel, Jana Dittmann, Claus Vielhauer:
How contact pressure, contact time, smearing and oil/skin lotion influence the aging of latent fingerprint traces: First results for the binary pixel feature using a CWL sensor. WIFS 2011: 1-6 - [e16]Claus Vielhauer, Jana Dittmann, Andrzej Drygajlo, Niels Christian Juul, Michael C. Fairhurst:
Biometrics and ID Management - COST 2101 European Workshop, BioID 2011, Brandenburg (Havel), Germany, March 8-10, 2011. Proceedings. Lecture Notes in Computer Science 6583, Springer 2011, ISBN 978-3-642-19529-7 [contents] - [e15]Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, Edward J. Delp III:
Media Forensics and Security III, San Francisco Airport, CA, USA, January 24-26, 2011, Proceedings. SPIE Proceedings 7880, SPIE 2011, ISBN 978-0-8194-8417-8 [contents] - [e14]Chad Heitzenrater, Scott Craver, Jana Dittmann:
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security, MM&Sec '11, Buffalo, New York, USA, September 29-30, 2011. ACM 2011, ISBN 978-1-4503-0806-9 [contents] - 2010
- [c111]Ronny Merkel, Tobias Hoppe, Christian Krätzer, Jana Dittmann:
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis. Communications and Multimedia Security 2010: 93-105 - [c110]Karl Kümmel, Claus Vielhauer, Tobias Scheidat, Dirk Franke, Jana Dittmann:
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction. Communications and Multimedia Security 2010: 178-190 - [c109]Enrico Herrmann, Andrey Makrushin, Jana Dittmann, Claus Vielhauer, Mirko Langnickel, Christian Krätzer:
Hand-movement-based in-vehicle driver/front-seat passenger discrimination for centre console controls. Image Processing: Algorithms and Systems 2010: 75320 - [c108]Andrey Makrushin, Jana Dittmann, Claus Vielhauer, Mirko Langnickel, Christian Krätzer:
The feasibility test of state-of-the-art face detection algorithms for vehicle occupant detection. Image Processing: Algorithms and Systems 2010: 75320 - [c107]Jana Dittmann, Bernhard Karpuschewski, Jana Fruth, Mathias Petzel, Richard Münder:
An exemplary attack scenario: threats to production engineering inspired by the Conficker worm. IWDE 2010: 25-32 - [c106]Sven Tuchscheerer, Jana Dittmann, Tobias Hoppe, Josef F. Krems:
Theoretical analysis of security warnings in vehicles and design challenges for the evaluation of security warnings in virtual environments. IWDE 2010: 33-37 - [c105]Kun Qian, Christian Krätzer, Michael Biermann, Jana Dittmann:
Audio annotation watermarking with robustness against DA/AD conversion. Media Forensics and Security 2010: 75410W - [c104]Andrey Makrushin, Claus Vielhauer, Jana Dittmann:
The impact of ARTMAP to appearance-based face verification. MM&Sec 2010: 89-94 - [c103]Christian Kraetzer, Ronny Merkel, Robert Altschaffel, Eric Clausing, Maik Schott, Jana Dittmann:
Modelling watermark communication protocols using the CASPER modelling language. MM&Sec 2010: 107-116 - [c102]Stefan Kiltz, Mario Hildebrandt, Robert Altschaffel, Jana Dittmann:
A Transparent Bridge for Forensic Sound Network Traffic Data Acquisition. Sicherheit 2010: 93-104 - [c101]Tobias Hoppe, Sönke Holthusen, Sven Tuchscheerer, Stefan Kiltz, Jana Dittmann:
Sichere Datenhaltung im Automobil am Beispiel eines Konzepts zur forensisch sicheren Datenspeicherung. Sicherheit 2010: 153-164 - [e13]Nasir D. Memon, Jana Dittmann, Adnan M. Alattar, Edward J. Delp:
Media Forensics and Security II, part of the IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 18-20, 2010, Proceedings. SPIE Proceedings 7541, SPIE 2010, ISBN 978-0-8194-7934-1 [contents] - [e12]Patrizio Campisi, Jana Dittmann, Scott Craver:
Multimedia and Security Workshop, MM&Sec 2010, Roma, Italy, September 9-10, 2010. ACM 2010, ISBN 978-1-4503-0286-9 [contents]
2000 – 2009
- 2009
- [b3]Andrea Oermann, Gerald Jäschke, Jana Dittmann:
Vertrauenswürdige und abgesicherte Langzeitarchivierung multimedialer Inhalte. nestor Materialien 14, 2009, pp. 1-146 - [j17]Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Handwriting verification - Comparison of a multi-algorithmic and a multi-semantic approach. Image Vis. Comput. 27(3): 269-278 (2009) - [c100]Marcus Nitsche, Jana Dittmann, Andreas Nürnberger, Claus Vielhauer, Robert Buchholz:
Security-Relevant Challenges of Selected Systems for Multi-user Interaction. Adaptive Multimedia Retrieval 2009: 124-134 - [c99]Sandro Schulze, Mario Pukall, Gunter Saake, Tobias Hoppe, Jana Dittmann:
On the Need of Data Management in Automotive Systems. BTW 2009: 217-226 - [c98]Tobias Scheidat, Michael Biermann, Jana Dittmann, Claus Vielhauer, Karl Kümmel:
Multi-biometric Fusion for Driver Authentication on the Example of Speech and Face. COST 2101/2102 Conference 2009: 220-227 - [c97]Christian Krätzer, Jana Dittmann:
Der Einfluss gleichgewichteter Fusion in der Mikrofonforensik unter beispielhafter Nutzung von zwei Klassifikatoren. GI Jahrestagung 2009: 1604-1618 - [c96]Stefan Kiltz, Tobias Hoppe, Jana Dittmann, Claus Vielhauer:
Video surveillance: A new forensic model for the forensically sound retrival of picture content off a memory dump. GI Jahrestagung 2009: 1619-1633 - [c95]Stefan Kiltz, Tobias Hoppe, Jana Dittmann:
A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump. DPS 2009: 1-6 - [c94]Andrey Makrushin, Mirko Langnickel, Maik Schott, Claus Vielhauer, Jana Dittmann, Katharina Seifert:
Car-seat occupancy detection using a monocular 360° NIR camera and advanced template matching. DPS 2009: 1-6 - [c93]Robert Buchholz, Christian Krätzer, Jana Dittmann:
Microphone Classification Using Fourier Coefficients. Information Hiding 2009: 235-246 - [c92]Robert Altschaffel, Stefan Kiltz, Jana Dittmann:
From the Computer Incident Taxonomy to a Computer Forensic Examination Taxonomy. IMF 2009: 54-68 - [c91]Sascha Schimke, Maik Schott, Claus Vielhauer, Jana Dittmann:
Evaluation of Fusion for Similarity Searching in Online Handwritten Documents. ICDM 2009: 276-290 - [c90]Christian Krätzer, Jana Dittmann:
The impact of information fusion in steganalysis on the example of audio steganalysis. Media Forensics and Security 2009: 725409 - [c89]Claus Vielhauer, Maik Schott, Jana Dittmann:
Nested object watermarking. Media Forensics and Security 2009: 725416 - [c88]Christian Kraetzer, Maik Schott, Jana Dittmann:
Unweighted fusion in microphone forensics using a decision tree and linear logistic regression models. MM&Sec 2009: 49-56 - [c87]Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats. SAFECOMP 2009: 145-158 - [e11]Edward J. Delp, Jana Dittmann, Nasir D. Memon, Ping Wah Wong:
Media Forensics and Security I, part of the IS&T-SPIE Electronic Imaging Symposium, San Jose, CA, USA, January 19-21, 2009, Proceedings. SPIE Proceedings 7254, SPIE 2009, ISBN 978-0-8194-7504-6 [contents] - [e10]Edward W. Felten, Jana Dittmann, Jessica J. Fridrich, Scott Craver:
Multimedia and Security Workshop, MM&Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009. ACM 2009, ISBN 978-1-60558-492-8 [contents] - 2008
- [c86]Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment. IAS 2008: 295-298 - [c85]Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Advanced Studies on Reproducibility of Biometric Hashes. BIOID 2008: 150-159 - [c84]Christian Krätzer, Jana Dittmann:
Impact of feature selection in classification for hidden channel detection on the example of audio data hiding. MM&Sec 2008: 159-166 - [c83]Michael Biermann, Tobias Hoppe, Jana Dittmann, Claus Vielhauer:
Vehicle systems: comfort & security enhancement of face/speech fusion with compensational biometric modalities. MM&Sec 2008: 185-194 - [c82]Andreas Lang, Jana Dittmann:
Digital audio watermarking evaluation within the application field of perceptual hashing. SAC 2008: 1192-1196 - [c81]Tobias Hoppe, Stefan Kiltz, Jana Dittmann:
Security Threats to Automotive CAN Networks - Practical Examples and Selected Short-Term Countermeasures. SAFECOMP 2008: 235-248 - [c80]Andrey Makrushin, Jana Dittmann, Stefan Kiltz, Tobias Hoppe:
Exemplarische Mensch-Maschine-Interaktionsszenarien und deren Komfort-, Safety- und Security-Implikationen am Beispiel von Gesicht und Sprache. Sicherheit 2008: 315-327 - [c79]Tobias Hoppe, Jana Dittmann:
Vortäuschen von Komponentenfunktionalität im Automobil: Safety- und Komfort-Implikationen durch Security-Verletzungen am Beispiel des Airbags. Sicherheit 2008: 341-353 - [c78]Christian Kraetzer, Jana Dittmann:
Cover signal specific steganalysis: the impact of training on the example of two selected audio steganalysis approaches. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190Y - [c77]Christian Zeitz, Tobias Scheidat, Jana Dittmann, Claus Vielhauer, Elisardo González-Agulla, Enrique Otero Muras, Carmen García-Mateo, José Luis Alba-Castro:
Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 68190R - [c76]Christian Kraetzer, Jana Dittmann, Ronny Merkel:
WLAN steganography revisited. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681903 - [c75]Claus Vielhauer, Maik Schott, Christian Krätzer, Jana Dittmann:
Nested object watermarking: transparency and capacity evaluation. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681918 - [e9]Andrew D. Ker, Jana Dittmann, Jessica J. Fridrich:
Proceedings of the 10th workshop on Multimedia & Security, MM&Sec 2008, Oxford, UK, September 22-23, 2008. ACM 2008, ISBN 978-1-60558-058-6 [contents] - [e8]Edward J. Delp III, Ping Wah Wong, Jana Dittmann, Nasir D. Memon:
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008. SPIE Proceedings 6819, SPIE 2008, ISBN 978-0-8194-6991-5 [contents] - [r4]Claus Villager, Jana Dittmann:
Biometrics for User Authentication. Encyclopedia of Multimedia 2008: 48-55 - [r3]Martin Steinebach, Jana Dittmann, Erich J. Neuhold:
Digital Watermarking. Encyclopedia of Multimedia 2008: 181-186 - 2007
- [j16]Sonia Garcia-Salicetti, Julian Fiérrez-Aguilar, Fernando Alonso-Fernandez, Claus Vielhauer, Richard M. Guest, Lorène Allano, Doan Trung Tung, Tobias Scheidat, Van-Bao Ly, Jana Dittmann, Bernadette Dorizzi, Javier Ortega-Garcia, Joaquin Gonzalez-Rodriguez, Martino Bacile Di Castiglione, Michael C. Fairhurst:
Biosecure reference systems for on-line signature verification: A study of complementarity. Ann. des Télécommunications 62(1-2): 36-61 (2007) - [c74]Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Study of possibility of on-pen matching for biometric handwriting verification. EUSIPCO 2007: 184-188 - [c73]Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Single-Semantic Multi-Instance Fusion of Handwriting Based Biometric Authentication Systems. ICIP (2) 2007: 393-396 - [c72]Christian Krätzer, Jana Dittmann:
Pros and Cons of Mel-cepstrum Based Audio Steganalysis Using SVM Classification. Information Hiding 2007: 359-377 - [c71]Christian Krätzer, Andrea Oermann, Jana Dittmann, Andreas Lang:
Digital audio forensics: a first practical evaluation on microphone and environment classification. MM&Sec 2007: 63-74 - [c70]Andreas Lang, Jana Dittmann, Stefan Kiltz, Tobias Hoppe:
Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment. SAFECOMP 2007: 40-53 - [c69]Claus Vielhauer, Jana Dittmann:
Nested object watermarking: comparison of block-luminance and blue channel LSB wet paper code image watermarking. Security, Steganography, and Watermarking of Multimedia Contents 2007: 65050L - [c68]Christian Kraetzer, Jana Dittmann:
Mel-cepstrum-based steganalysis for VoIP steganography. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650505 - [c67]Andreas Lang, Jana Dittmann:
Digital watermarking of biometric speech references: impact to the EER system performance. Security, Steganography, and Watermarking of Multimedia Contents 2007: 650513 - [e7]Deepa Kundur, Balakrishnan Prabhakaran, Jana Dittmann, Jessica J. Fridrich:
Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007. ACM 2007, ISBN 978-1-59593-857-2 [contents] - 2006
- [j15]Helmut Reimer, Jana Dittmann, Claus Vielhauer, Felix C. Freiling, Francesca Saglietti, Manfred Reitenspieß, Andreas Lang:
Veranstaltungsbesprechungen. Datenschutz und Datensicherheit 30(4): 258-259 (2006) - [j14]Jana Dittmann, Edward J. Delp:
Guest Editorial: Special Section on Security, Steganography, and Watermarking. J. Electronic Imaging 15(4): 041101 (2006) - [j13]Jana Dittmann, David Megías, Andreas Lang, Jordi Herrera-Joancomartí:
Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity. Trans. Data Hiding Multim. Secur. 1: 1-40 (2006) - [c66]Andrea Oermann, Sandra Gebbensleben, Claus Vielhauer, Jana Dittmann:
Concept for Audio Quality and Security Assurance in Mobile Phones as Multimodal User Guides. AXMEDIS 2006: 337-340 - [c65]Christian Krätzer, Jana Dittmann, Thomas Vogel, Reyk Hillert:
Design and evaluation of steganography for voice-over-IP. ISCAS 2006 - [c64]Christian Krätzer, Jana Dittmann, Andreas Lang, Tobias Kühne:
WLAN steganography: a first practical review. MM&Sec 2006: 17-22 - [c63]Andreas Lang, Jana Dittmann:
Transparency and complexity benchmarking of audio watermarking algorithms issues. MM&Sec 2006: 190-201 - [c62]Andrea Oermann, Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Semantic Fusion for Biometric User Authentication as Multimodal Signal Processing. MRCS 2006: 546-553 - [c61]Thomas Vogel, Jana Dittmann, Reyk Hillert, Christian Krätzer:
Design und Evaluierung von Steganographie für Voice-over-IP. Sicherheit 2006: 131-142 - [c60]Christian Kraetzer, Jana Dittmann, Andreas Lang:
Transparency benchmarking on audio watermarks and steganography. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60721L - [c59]Andreas Lang, Jana Dittmann:
Profiles for evaluation: the usage of audio WET. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60721J - [e6]Sviatoslav Voloshynovskiy, Jana Dittmann, Jessica J. Fridrich:
Proceedings of the 8th workshop on Multimedia & Security, MM&Sec 2006, Geneva, Switzerland, September 26-27, 2006. ACM 2006, ISBN 1-59593-493-6 [contents] - [e5]Jana Dittmann:
Sicherheit 2006: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 20.-22. Februar 2006 in Magdeburg. LNI P-77, GI 2006, ISBN 3-88579-171-4 [contents] - [r2]Martin Steinebach, Jana Dittmann, Erich J. Neuhold:
Digital Watermarking. Encyclopedia of Multimedia 2006 - [r1]Claus Villager, Jana Dittmann:
Biometrics for User Authentication. Encyclopedia of Multimedia 2006 - 2005
- [j12]Jana Dittmann, Elke Franz, Antje Schneidewind:
Steganographie und Wasserzeichen - Aktueller Stand und neue Herausforderungen. Inform. Spektrum 28(6): 453-461 (2005) - [j11]Jana Dittmann:
Editorial to the special issue about multimedia and security. Multim. Syst. 11(2): 93-94 (2005) - [c58]Martin Steinebach, Jana Dittmann:
Secure Production of Digital Media. From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments 2005: 79-86 - [c57]Andrea Oermann, Jana Dittmann, Claus Vielhauer:
Verifier-Tuple as a Classifier for Biometric Handwriting Authentication - Combination of Syntax and Semantics. Communications and Multimedia Security 2005: 170-179 - [c56]Enrico Hauer, Jana Dittmann, Martin Steinebach:
Digital Signatures Based on Invertible Watermarks for Video Authentication. Communications and Multimedia Security 2005: 277-279 - [c55]Tobias Scheidat, Claus Vielhauer, Jana Dittmann:
Distance-Level Fusion Strategies for Online Signature Verification. ICME 2005: 1294-1297 - [c54]Andrea Oermann, Jana Dittmann:
Evaluierung von Sicherheitsmechanismen für eLearning zur Sicherung der Integrität und Authentizität bei Medienübergängen. Leipziger Informatik-Tage 2005: 391-400 - [c53]Andreas Lang, Jana Dittmann, Ryan Spring, Claus Vielhauer:
Audio watermark attacks: from single to profile attacks. MM&Sec 2005: 39-50 - [c52]Andrea Oermann, Andreas Lang, Jana Dittmann:
Verifier-tuple for audio-forensic to determine speaker environment. MM&Sec 2005: 57-62 - [c51]Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Ensuring Media Integrity on Third-Party Infrastructures. SEC 2005: 493-508 - [c50]Jana Dittmann, Andreas Lang, Martin Steinebach, Stefan Katzenbeisser:
ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. Sicherheit 2005: 189-192 - [c49]Claus Vielhauer, Jana Dittmann, Christian Helmholz, Marten Wenzel:
Multifaktorielle Benutzerauthentifizierung durch PAM und Fingerabdruck für Linux Infrastrukturen. Sicherheit 2005: 309-312 - [c48]Andreas Lang, Jana Dittmann, Eugene T. Lin, Edward J. Delp:
Application-oriented audio watermark benchmark service. Security, Steganography, and Watermarking of Multimedia Contents 2005: 275-286 - [c47]Claus Vielhauer, T. K. Basu, Jana Dittmann, Pranab K. Dutta:
Finding meta data in speech and handwriting biometrics. Security, Steganography, and Watermarking of Multimedia Contents 2005: 504-515 - [c46]Thomas Vogel, Jana Dittmann:
Illustration watermarking: an object-based approach for digital images. Security, Steganography, and Watermarking of Multimedia Contents 2005: 578-589 - [c45]Jana Dittmann, Danny Hesse, Reyk Hillert:
Steganography and steganalysis in voice-over IP scenarios: operational aspects and first experiences with a new steganalysis tool set. Security, Steganography, and Watermarking of Multimedia Contents 2005: 607-618 - [e4]Jana Dittmann, Stefan Katzenbeisser, Andreas Uhl:
Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings. Lecture Notes in Computer Science 3677, Springer 2005, ISBN 3-540-28791-4 [contents] - [e3]Ahmet M. Eskicioglu, Jessica J. Fridrich, Jana Dittmann:
Proceedings of the 7th workshop on Multimedia & Security, MM&Sec 2005, New York, NY, USA, August 1-2, 2005, 2006. ACM 2005, ISBN 1-59593-032-9 [contents] - 2004
- [j10]Benoît Macq, Jana Dittmann, Edward J. Delp:
Benchmarking of Image Watermarking Algorithms for Digital Rights Management. Proc. IEEE 92(6): 971-984 (2004) - [j9]Pierre Moulin, Ton Kalker, Ingemar J. Cox, Jana Dittmann, Pierre Duhamel, Avinash Jain, Stefan Katzenbeisser, Reginald L. Lagendijk:
Guest Editorial: Supplement on Secure Media - I. IEEE Trans. Signal Process. 52(10): 2954 (2004) - [c44]Jana Dittmann, Claus Vielhauer:
Introduction from Session Chairs: New Challenges in Media Security. EUROMICRO 2004: 448-448 - [c43]Danny Hesse, Jana Dittmann, Andreas Lang:
Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images. EUROMICRO 2004: 453-456 - [c42]Stefan Thiemert, Thomas Vogel, Jana Dittmann, Martin Steinebach:
A High-Capacity Block Based Video Watermark. EUROMICRO 2004: 457-460 - [c41]Sascha Schimke, Claus Vielhauer, Jana Dittmann:
Using Adapted Levenshtein Distance for On-Line Signature Authentication. ICPR (2) 2004: 931-934 - [c40]Jana Dittmann, Jessica J. Fridrich:
Introduction to the ACM multimedia and security workshop. MM&Sec 2004: 1-3 - [c39]Jana Dittmann, Danny Hesse:
Network based intrusion detection to detect steganographic communication channels: on the example of audio data. MMSP 2004: 343-346 - [c38]Jana Dittmann, Martin Steinebach, Andreas Lang, Sascha Zmudzinski:
Advanced audio watermarking benchmarking. Security, Steganography, and Watermarking of Multimedia Contents 2004: 224-235 - [c37]Stefan Katzenbeisser, Jana Dittmann:
Malicious attacks on media authentication schemes based on invertible watermarks. Security, Steganography, and Watermarking of Multimedia Contents 2004: 838-847 - [e2]Jana Dittmann, Jessica J. Fridrich:
Proceedings of the 6th workshop on Multimedia & Security, MM&Sec 2004, Magdeburg, Germany, September 20-21, 2004. ACM 2004, ISBN 1-58113-854-7 [contents] - [i1]Jana Dittmann, Stefan Katzenbeisser, Christian Schallhart, Helmut Veith:
Provably Secure Authentication of Digital Media Through Invertible Watermarks. IACR Cryptol. ePrint Arch. 2004: 293 (2004) - 2003
- [j8]Martin Steinebach, Jana Dittmann:
Watermarking-Based Digital Audio Data Authentication. EURASIP J. Adv. Signal Process. 2003(10): 1001-1015 (2003) - [j7]Jana Dittmann, Stefan Katzenbeisser, Nasir D. Memon:
Editorial. Multim. Syst. 9(3): 215 (2003) - [c36]Martin Steinebach, Enrico Hauer, Jana Dittmann:
Digitale Audiowasserzeichen im Archivbereich - Das H2O4M Projekt. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 395-398 - [c35]Andreas Lang, Jana Dittmann, Martin Steinebach:
Psycho-akustische Modelle für StirMark Benchmark - Modelle zur Transparenzevaluierung. GI Jahrestagung (Schwerpunkt "Sicherheit - Schutz und Zuverlässigkeit") 2003: 399-410 - [c34]Henry Sonnet, Tobias Isenberg, Jana Dittmann, Thomas Strothotte:
Illustration Watermarks for Vector Graphics. PG 2003: 73-82 - [c33]Martin Steinebach, Jana Dittmann:
Capacity-optimized mp2 audio watermarking. Security and Watermarking of Multimedia Contents 2003: 44-54 - [c32]Oliver Benedens, Jana Dittmann, Fabien A. P. Petitcolas:
3D watermarking design evaluation. Security and Watermarking of Multimedia Contents 2003: 337-348 - [c31]Jana Dittmann, Oliver Benedens:
Invertible authentication for 3D meshes. Security and Watermarking of Multimedia Contents 2003: 653-664 - 2002
- [j6]Jana Dittmann, Martin Steinebach, Petra Wohlmacher, Ralf Ackermann:
Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources. EURASIP J. Adv. Signal Process. 2002(2): 174-184 (2002) - [c30]Martin Steinebach, Jana Dittmann, Eva Saar:
Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions. Communications and Multimedia Security 2002: 197-212 - [c29]Martin Steinebach, Andreas Lang, Jana Dittmann, Christian Neubauer:
Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes. ITCC 2002: 100-105 - [c28]Martin Steinebach, Andreas Lang, Jana Dittmann:
StirMark Benchmark: audio watermarking attacks based on lossy compression. Security and Watermarking of Multimedia Contents 2002: 79-90 - [c27]Jana Dittmann, Martin Steinebach, Lucilla Croce Ferri:
Watermarking protocols for authentication and ownership protection based on timestamps and holograms. Security and Watermarking of Multimedia Contents 2002: 240-251 - 2001
- [j5]Jana Dittmann, Petra Wohlmacher, Klara Nahrstedt:
Using Cryptographic and Watermarking Algorithms. IEEE Multim. 8(4): 54-65 (2001) - [c26]Jana Dittmann, Petra Wohlmacher, Ralf Ackermann:
Conditional Access for Business and M-Commerce Applications using Annotation Watermarks. Communications and Multimedia Security 2001 - [c25]Martin Steinebach, Jana Dittmann, Christian Seibel, Lucilla Croce Ferri, Fabien A. P. Petitcolas, Nazim Fatès, Caroline Fontaine, Frédéric Raynal:
StirMark Benchmark: Audio Watermarking Attacks. ITCC 2001: 49-54 - [c24]Jana Dittmann, Lucilla Croce Ferri, Claus Vielhauer:
Hologram Watermarks for Document Authentications. ITCC 2001: 60-64 - [c23]Jana Dittmann, Petra Wohlmacher, Klara Nahrstedt:
Introduction to multimedia and security: protecting the media of the future - securing the future of the media. MM&Sec 2001: 1-2 - [c22]Jana Dittmann, Martin Steinebach:
PlataJanus: an audio annotation watermarking framework. MM&Sec 2001: 44-47 - [c21]Jana Dittmann, Martin Steinebach:
Joint watermarking of audio-visual data. MMSP 2001: 601-606 - [c20]Jana Dittmann, Enrico Hauer, Claus Vielhauer, Jörg Schwenk, Eva Saar:
Customer Identification for MPEG Video Based on Digital Fingerprinting. IEEE Pacific Rim Conference on Multimedia 2001: 383-390 - [c19]Jana Dittmann, Anirban Mukherjee, Martin Steinebach:
Computer-aided visual model for ensuring video watermarking transparency. Security and Watermarking of Multimedia Contents 2001: 45-54 - [c18]Jana Dittmann:
Content-fragile watermarking for image authentication. Security and Watermarking of Multimedia Contents 2001: 175-184 - [c17]Fabien A. P. Petitcolas, Martin Steinebach, Frédéric Raynal, Jana Dittmann, Caroline Fontaine, Nazim Fatès:
Public automated web-based evaluation service for watermarking schemes: StirMark benchmark. Security and Watermarking of Multimedia Contents 2001: 575-584 - [c16]Jana Dittmann, Martin Steinebach, Ralf Steinmetz:
Merkmale digitaler Audiodaten zur Verwendung in inhaltsfragilen digitalen Wasserzeichen. VIS 2001: 193-207 - [c15]Artur Dappa, Jana Dittmann, Martin Steinebach, Claus Vielhauer:
Eine Sicherheitsarchitektur auf Basis digitaler Wasserzeichen und kryptographischer Ansätze. VIS 2001: 209-224 - [e1]Ralf Steinmetz, Jana Dittmann, Martin Steinebach:
Communications and Multimedia Security Issues of the New Century, Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues, May 21-22, 2001, Darmstadt, Germany. IFIP Conference Proceedings 192, Kluwer 2001, ISBN 0-7923-7365-0 [contents] - 2000
- [b2]Jana Dittmann:
Digitale Wasserzeichen - Grundlagen, Verfahren, Anwendungsgebiete. Xpert.press, Springer 2000, ISBN 978-3-540-66661-5, pp. I-IX, 1-183 - [j4]Jana Dittmann, Martin Steinebach:
Manipulationserkennung bei digitalem Bildmaterial mit fragilen Wasserzeichen. Datenschutz und Datensicherheit 24(10) (2000) - [j3]Jana Dittmann, Frank Nack:
Copyright-Copywrong. IEEE Multim. 7(4): 14-17 (2000) - [j2]Jana Dittmann, Ralf Steinmetz:
Digitale Wasserzeichen - Aktuelles Schlagwort. Inform. Spektrum 23(1): 47-50 (2000) - [j1]Jana Dittmann, Peter Schmitt, Eva Saar, Jörg Schwenk, Johannes Ueberberg:
Combining digital watermarks and collusion secure fingerprints for digital images. J. Electronic Imaging 9(4): 456-467 (2000) - [c14]Klara Nahrstedt, Jana Dittmann, Petra Wohlmacher:
Approaches to Multimedia and Security. IEEE International Conference on Multimedia and Expo (III) 2000: 1275-1278 - [c13]Jana Dittmann, Anirban Mukherjee, Martin Steinebach:
Media-Independent Watermarking Classification and the Need for Combining Digital Video and Audio Watermarking for Media Authentication. ITCC 2000: 62-67 - [c12]Jana Dittmann, Martin Steinebach, Thomas Kunkelmann, Ludwig Stoffels:
H204M - watermarking for media: classification, quality evaluation, design improvements. ACM Multimedia Workshops 2000: 107-110 - [c11]Jana Dittmann, Thomas Fiebig, Ralf Steinmetz:
New approach for transformation-invariant image and video watermarking in the spatial domain: self-spanning patterns (SSP). Security and Watermarking of Multimedia Contents 2000: 176-185 - [c10]Jana Dittmann, Martin Steinebach, Ivica Rimac, Stephan Fischer, Ralf Steinmetz:
Combined video and audio watermarking: embedding content information in multimedia data. Security and Watermarking of Multimedia Contents 2000: 455-464
1990 – 1999
- 1999
- [b1]Jana Dittmann:
Sicherheit in Medienströmen - digitale Wasserzeichen. Darmstadt University of Technology, Germany, 1999 - [c9]Jana Dittmann, Arnd Steinmetz, Ralf Steinmetz:
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking. ICMCS, Vol. 2 1999: 209-213 - [c8]Jana Dittmann:
Multimedia and Security Demo at IEEE Multimedia Systems '99. ICMCS, Vol. 2 1999: 1001-1002 - [c7]Jana Dittmann, Arnd Steinmetz, Ralf Steinmetz:
Content-Fragile Watermarking Based on Content-Based Digital Signatures. IDMS 1999: 259-272 - [c6]Jana Dittmann, Alexander Behr, Mark Stabenau, Peter Schmitt, Jörg Schwenk, Johannes Ueberberg:
Combining digital watermarks and collusion-secure fingerprints for digital images. Security and Watermarking of Multimedia Contents 1999: 171-183 - [p2]Jana Dittmann:
Sicherheit in Medienströmen: Digitale Wasserzeichen. Ausgezeichnete Informatikdissertationen 1999: 42-51 - 1998
- [c5]Jana Dittmann, Frank Nack, Arnd Steinmetz, Ralf Steinmetz:
Interactive Watermarking Environments. ICMCS 1998: 286-294 - [c4]Carsten Griwodz, Oliver Merkel, Jana Dittmann, Ralf Steinmetz:
Protecting VoD the Easier Way. ACM Multimedia 1998: 21-28 - [c3]Jana Dittmann, Mark Stabenau, Ralf Steinmetz:
Robust MPEG Video Watermarking Technologies. ACM Multimedia 1998: 71-80 - [c2]Frank Nack, Arnd Steinmetz, Jana Dittmann, Christian Wilk:
A4SM: A Framework for Distributed Digital Video Production. SYBEN 1998: 466-475 - 1997
- [c1]Jana Dittmann, Arnd Steinmetz:
Enabling Technology for the Trading of MPEG-encoded Video. ACISP 1997: 314-324 - [p1]Jana Dittmann, Arnd Steinmetz:
Sicherheitsproblematik in verteilten, digitalen Videoanwendungen und Präsentation eines technischen Lösungsansatzes zur transparenten Verschlüsselung von MPEG-2 Video. Verläßliche IT-Systeme 1997: 157-170
Coauthor Index
aka: Christian Kraetzer
aka: Kevin Lamshöft
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint